Skip to main content
  • Conference proceedings
  • © 2008

Information Security

11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5222)

Part of the book sub series: Information Systems and Applications, incl. Internet/Web, and HCI (LNISA)

Conference series link(s): ISC: International Conference on Information Security

Conference proceedings info: ISC 2008.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (33 papers)

  1. Front Matter

  2. Trusted Computing

    1. Property-Based TPM Virtualization

      • Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
      Pages 1-16
    2. A Demonstrative Ad Hoc Attestation System

      • Endre Bangerter, Maksim Djackov, Ahmad-Reza Sadeghi
      Pages 17-30
    3. Property-Based Attestation without a Trusted Third Party

      • Liqun Chen, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi
      Pages 31-46
    4. The Reduced Address Space (RAS) for Application Memory Authentication

      • David Champagne, Reouven Elbaz, Ruby B. Lee
      Pages 47-63
  3. Database and System Security

    1. An Efficient PIR Construction Using Trusted Hardware

      • Yanjiang Yang, Xuhua Ding, Robert H. Deng, Feng Bao
      Pages 64-79
    2. Athos: Efficient Authentication of Outsourced File Systems

      • Michael T. Goodrich, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos
      Pages 80-96
    3. BotTracer: Execution-Based Bot-Like Malware Detection

      • Lei Liu, Songqing Chen, Guanhua Yan, Zhao Zhang
      Pages 97-113
  4. Intrusion Detection

    1. Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets

      • Ryan Iwahashi, Daniela A. S. de Oliveira, S. Felix Wu, Jedidiah R. Crandall, Young-Jun Heo, Jin-Tae Oh et al.
      Pages 114-130
    2. Distinguishing between FE and DDoS Using Randomness Check

      • Hyundo Park, Peng Li, Debin Gao, Heejo Lee, Robert H. Deng
      Pages 131-145
  5. Network Security

    1. Antisocial Networks: Turning a Social Network into a Botnet

      • Elias Athanasopoulos, A. Makridakis, S. Antonatos, D. Antoniades, Sotiris Ioannidis, K. G. Anagnostakis et al.
      Pages 146-160
    2. Compromising Anonymity Using Packet Spinning

      • Vasilis Pappas, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos
      Pages 161-174
    3. Behavior-Based Network Access Control: A Proof-of-Concept

      • Vanessa Frias-Martinez, Salvatore J. Stolfo, Angelos D. Keromytis
      Pages 175-190
    4. Path-Based Access Control for Enterprise Networks

      • Matthew Burnside, Angelos D. Keromytis
      Pages 191-203
  6. Cryptanalysis

    1. Cryptanalysis of Rabbit

      • Yi Lu, Huaxiong Wang, San Ling
      Pages 204-214
    2. Algebraic Attack on HFE Revisited

      • Jintai Ding, Dieter Schmidt, Fabian Werner
      Pages 215-227
    3. Revisiting Wiener’s Attack – New Weak Keys in RSA

      • Subhamoy Maitra, Santanu Sarkar
      Pages 228-243
    4. Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family

      • Somitra Kumar Sanadhya, Palash Sarkar
      Pages 244-259
  7. Digital Signatures

    1. Proxy Re-signatures in the Standard Model

      • Sherman S. M. Chow, Raphael C. -W. Phan
      Pages 260-276

Other Volumes

  1. Information Security

About this book

This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC 2008, held in Taipei, Taiwan, September 15-18, 2008.

The 33 revised full papers presented were carefully reviewed and selected from 134 submissions. The papers are organized in topical sections on trusted computing, database and system security, intrusion detection, network security, cryptanalysis, digital signatures, AES, symmetric cryptography and hash functions, authentication as well as security protocols.

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access